CN102882780B - Looped network tunnel configuration method based on overlapping trees, ring network protection method and system - Google Patents
Looped network tunnel configuration method based on overlapping trees, ring network protection method and system Download PDFInfo
- Publication number
- CN102882780B CN102882780B CN201110198332.1A CN201110198332A CN102882780B CN 102882780 B CN102882780 B CN 102882780B CN 201110198332 A CN201110198332 A CN 201110198332A CN 102882780 B CN102882780 B CN 102882780B
- Authority
- CN
- China
- Prior art keywords
- tunnel
- node
- business
- state
- ring
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 230000001681 protective effect Effects 0.000 claims abstract description 40
- 230000008859 change Effects 0.000 claims description 20
- 230000007257 malfunction Effects 0.000 claims description 14
- 238000001514 detection method Methods 0.000 claims description 12
- 230000005540 biological transmission Effects 0.000 claims description 10
- 239000002356 single layer Substances 0.000 claims description 4
- 230000008034 disappearance Effects 0.000 claims description 2
- 239000010410 layer Substances 0.000 description 14
- 230000008569 process Effects 0.000 description 11
- 238000010586 diagram Methods 0.000 description 5
- 238000005538 encapsulation Methods 0.000 description 3
- 230000004888 barrier function Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000002457 bidirectional effect Effects 0.000 description 1
- 239000012141 concentrate Substances 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000009191 jumping Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/42—Loop networks
- H04L12/437—Ring fault isolation or reconfiguration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/0005—Control or signalling for completing the hand-off
- H04W36/0011—Control or signalling for completing the hand-off for data sessions of end-to-end connection
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Small-Scale Networks (AREA)
Abstract
The invention discloses a kind of looped network tunnel configuration method based on overlapping trees, ring network protection method and system; on ring, for the purpose of the lower link point of business, node configures work tunnel based on overlapping trees, and reversely closed protective tunnel corresponding with work tunnel.The present invention is by setting up multiple MP2P overlapping trees on a ring; one or more nodes from ring can be carried on each overlapping trees enter ring and go out the business of ring to same node; avoid the complexity of looped network tunnel configuration, improve the performance of protection switching, distribute rationally.
Description
Technical field
The present invention relates to looped network protection technical field, particularly relate to a kind of looped network tunnel configuration side based on overlapping trees
Method, ring network protection method and system.
Background technology
Current in looped network, for Wrapping(loopback in G.8132 standard) protection scheme, owing to this protection scheme is
Each protected LSP(Label Switching Path, label switched path) a corresponding closed protective ring, it configures work
Measuring too big, switching action is the most, switches the process time the most long.
Summary of the invention
Present invention solves the technical problem that and be to provide a kind of looped network tunnel configuration method based on overlapping trees, looped network protection
Method and system, optimize looped network configuration, improve the performance of protection switching.
For solving above-mentioned technical problem, the invention provides a kind of looped network tunnel configuration method based on overlapping trees, with
On ring, for the purpose of the lower link point of business, node configures work tunnel based on overlapping trees, and corresponding to described work tunnel
Reverse closed protective tunnel.
Further, the overlapping trees of the net loaded multiple multipoint-to-points of a physical rings (MP2P), described overlapping trees holds
Carry from described ring one or more nodes to the business of same destination node.
Further, described configuration work tunnel and closed protective tunnel, specifically refer to:
Along the clockwise of described ring and/or counterclockwise from the adjacent node of described lower link point to described lower link
Point, sets up work tunnel;
Rightabout along described work tunnel is set up from described lower link point to the closed protective tunnel of described lower link point
Road.
Additionally, present invention also offers a kind of ring net protection method based on overlapping trees, described method includes:
On ring for the purpose of the lower link point of business node configure work tunnel based on overlapping trees, and with described work
Make reverse closed protective tunnel accordingly, tunnel;
Link State between each nodal test and adjacent node on ring, when detecting that Link State changes, sends state
Change notification packet to other nodes on ring;
When described Link State changes into link or one malfunctions, fault phase neighbors will transmit in work tunnel
The business being sent to trouble point be switched on corresponding closed protective tunnel, by closed protective tunnel transmit be sent to trouble point
Business be switched in corresponding work tunnel;Node outside fault phase neighbors carries out transparent transmission to the business transmitted.
Further, described method also includes:
When described Link State changes into link or node failure disappears, fault phase neighbors will be switched to described closing
The business transmitted on protection tunnel is restored in described work tunnel.
Further, described method also includes:
When described Link State changes into link or one malfunctions, the state of this node is changed by fault phase neighbors
Becoming switching (Switch) state, the state of this node is changed into break-through (Pass by the node outside fault phase neighbors
Through) state;
When described Link State change into link or node failure disappear time, fault phase neighbors by the state of this node by
Switch state changes into free time (Idle) state;Node outside fault phase neighbors by the state of this node by Pass through
State changes into Idle state.
Further, described method also includes:
Service message uses press-in (PUSH) looped network tunnel label stacked manner when upper ring forwards, i.e. under described
The tunnel label of traffic direction press-in (PUSH) overlapping trees of link point and work tunnel, forwards along looped network, described
Lower link point ejects (POP) tunnel label and carries out ring under business.
Further, the overlapping trees of the net loaded multiple multipoint-to-points of a physical rings (MP2P), described overlapping trees holds
Carry from described ring one or more nodes to the business of same destination node;
Wherein, the business of described overlapping trees carrying, including: VPN (virtual private network) (VPN) business of single layer label, multilamellar
Label switched path (LSP) business of label, without the IP of label or Ethernet (Eth) business.
Further, described work tunnel supports that (PHP) is ejected in the last two jump.
Present invention also offers a kind of looped network tunnel configuration system based on overlapping trees, including: path configuration module,
Described path configuration module is used for, and on ring, for the purpose of the lower link point of business, node configuration is based on overlapping trees
Work tunnel, and reversely closed protective tunnel corresponding with described work tunnel.
Further, described path configuration module is used for, along the clockwise of described ring and/or counterclockwise from described
The adjacent node of lower link point, to described node, sets up work tunnel;
Rightabout along described work tunnel is set up from described lower link point to the closed protective tunnel of described lower link point
Road.
Present invention also offers a kind of Ring protection system based on overlapping trees, described system includes:
Path configuration module, for node configuration work based on overlapping trees for the purpose of the lower link point of business on ring
Tunnel, and reversely closed protective tunnel corresponding with described work tunnel;
State detection module, for detecting the Link State between this node and adjacent node;
State advertisement module, the Link State between detection and adjacent node, when detecting that Link State changes, send out
State is sent to change notification packet to other nodes on ring;
Business handover module, for changing notification packet according to the described state received, when knowing described Link State
Changing into normal condition when becoming link or one malfunctions, fault phase neighbors is sent to fault by transmit in work tunnel
The business of point is switched on corresponding closed protective tunnel, the business switching being sent to trouble point that will transmit on closed protective tunnel
In corresponding work tunnel;Node outside fault phase neighbors carries out transparent transmission to the business transmitted.
Further, described business handover module is additionally operable to, and changes notification packet according to the described state received, when obtaining
Know that when described Link State changes into link or node failure disappearance, then fault phase neighbors will be switched to described closed protective tunnel
The business transmitted on road is restored in described work tunnel.
Further, described business handover module is additionally operable to, when described Link State changes into link or node appearance event
During barrier, the state of this node is changed into Switch state by fault phase neighbors, and the node outside fault phase neighbors is by this node
State change into Pass through state;
When described Link State change into link or node failure disappear time, fault phase neighbors by the state of this node by
Switch state changes into Idle state;The state of this node is changed by the node outside fault phase neighbors by Pass through state
For Idle state.
The present invention proposes a kind of new WRAPPING looped network protection scheme, can be applicable to MPLS/MPLS-TP looped network, passes through
A ring is set up the overlapping trees of multiple multipoint-to-point (MP2P), each overlapping trees can carry from ring one or
Multiple nodes enter ring and go out the business of ring to same node, compared with prior art, it is to avoid the complexity of looped network tunnel configuration, carry
The high performance of protection switching, distributes rationally.
Accompanying drawing explanation
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes the part of the application, this
Bright schematic description and description is used for explaining the present invention, is not intended that inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the loop network topology structure schematic diagram according to prior art;
Fig. 2 is the comprising modules schematic diagram of the Ring protection system of the embodiment of the present invention;
Fig. 3 is the malfunction protection schematic diagram of the embodiment of the present invention;
Fig. 4 is the failure vanishes switching schematic diagram of the embodiment of the present invention;
Fig. 5 is the looped network protection process flow schematic diagram of the embodiment of the present invention.
Detailed description of the invention
Present embodiments provide for a kind of looped network tunnel configuration method based on overlapping trees, adopt the following technical scheme that
On ring for the purpose of the lower link point of business node configure work tunnel based on overlapping trees, and with this work
Reverse closed protective tunnel accordingly, tunnel.
Wherein, the overlapping trees of the net loaded multiple multipoint-to-points of a physical rings (MP2P), described overlapping trees carrying
From described ring, one or more nodes are to the business of same destination node.
Further, configuration work tunnel and closed protective tunnel, specifically refer to:
Along the clockwise of described ring and/or counterclockwise from the adjacent node of described lower link point to described lower link
Point, sets up work tunnel;
Rightabout along described work tunnel is set up from described lower link point to the closed protective tunnel of described lower link point
Road.
Based on above-mentioned looped network tunnel configuration method, present embodiments provide for a kind of looped network protection based on overlapping trees
Method, adopts the following technical scheme that
Step one, for the lower link point of ring operational line, node configuration work tunnel for the purpose of each lower link point
With closed protective tunnel.
Specifically, if being made up of n node on ring, then to each lower link point first along the clockwise of ring or inverse time
Pin direction is from the work tunnel (being equal to path) of the adjacent node of this node to this node, meanwhile, along the phase of work tunnel
Opposite direction sets up a protection tunnel closed, and needs to set up 2N work tunnel the most altogether and 2N protects tunnel.
Step 2, on ring, (i.e. on ring, each node detects and the Link State of two adjacent sections point every section of link respectively, including chain
Whether road or node break down) all startup separator detections, when nodal test a certain on ring to Link State or peer node
State is when normal condition becomes malfunction, along the direction away from fault of ring, sends state to other nodes and changes logical
Accuse message.
Step 3, after on ring, other nodes receive this state change notification packet, if fault phase neighbors, then
The business being sent to trouble point that will be transmitted in work tunnel, including: the VPN(Virtual Private of single layer label
Network, VPN (virtual private network)) business, the LSP service of multilayer labels, IP or Eth(Ethernet without label) business, switching
On corresponding closed protective tunnel, and the business being sent to trouble point transmitted on closed protective tunnel is switched to corresponding work
Make on tunnel;On ring, other nodes then carry out the transparent transmission of business.
Step 4, when the state of nodal test a certain on ring to Link State or peer node becomes normal from malfunction
During state, the direction away from original fault along ring sends state to other nodes and changes notification packet, and fault adjacent segments
Point detects failure vanishes on ring or receives the state that malfunction disappears when changing notification packet, then will be from this node
The business recovery sent on closed protective tunnel or receive sends or receives in work tunnel.
Step 5, after node on the ring receives this message notice becoming normal condition from malfunction, then all on ring
Node all becomes Idle state;And for fault phase neighbors, then the business that protection tunnel transmits is switched to work again
Transmit on tunnel, prevent the loss of data.
Step 6, when the business entering ring transmits in work tunnel, when being sent in work tunnel reciprocal the in business
During two jumpings, outer layer tunnel label can be ejected (PHP), what the business transmitted directly was sent to business goes out link point, continues
Resume and send.
Additionally, while above-mentioned steps three, also include following process step: when node on the ring detects fault or reception
When on ring, other nodes are sent to the state change notification packet of this node, if fault phase neighbors, then from Idle state
Switch to Switch(switch) state;For other nodes on ring (healthy phases neighbors), receive this state and change notice report
Wen Hou, then idle by Idle() state becomes Pass through(break-through) state.
For making the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to the present invention
Embodiment be described in detail.It should be noted that in the case of not conflicting, in embodiment in the application and embodiment
Feature can mutual combination in any.
Embodiment one
Present embodiments providing a kind of looped network tunnel configuration system based on overlapping trees, this system mainly includes that path is joined
Putting module, this path configuration module is used for: on ring, for the purpose of the lower link point of business, node configures work based on overlapping trees
Make tunnel, and reversely closed protective tunnel corresponding with work tunnel.
Further, above-mentioned path configuration module is used for: along the clockwise of described ring and/or counterclockwise from institute
State the adjacent node of lower link point to described node, set up work tunnel;
Rightabout along described work tunnel is set up from described lower link point to the closed protective tunnel of described lower link point
Road.
Embodiment two
As in figure 2 it is shown, the Ring protection system that the present embodiment provides mainly includes following four module: path configures mould
Block, state detection module, state advertisement module and business handover module.Wherein, the major function of each module is described as follows:
Path configuration module, is mainly used on ring node for the purpose of each lower link point of business, configures one from phase
Neighbors along ring clockwise or counterclockwise to the work tunnel on this lower link point, it addition, join for this work tunnel
Put the protection tunnel (hereinafter referred to as closed protective tunnel) of a closed-loop in opposite direction, this work tunnel is protected
Protect.
State detection module, is mainly used in being joined directly together the event of link layer between the adjacent node connect by looped network two
Barrier detection messages, detects the state of this section of link.
Such as, by detection CC&CV(Continuity Check and Connectivity Verification, even
Continuous property detection and connective confirmation) BFD(Bidirectional Forwarding Detection, two-way converting detects) message
Deng, detect Link State.
State advertisement module, this module is mainly used in (wrapping when Link State changes when state detection module detects
Include link or node failure), then produce a state and change notification packet, on ring, the direction away from fault is sent on ring
Node, until to the downstream node of fault;
Wherein, state changes notification packet, includes but not limited to: R-APS(Ring-Automatic Protection
Switching, looped network automatic protection switching) message etc..
For basis, business handover module, detects that Link State changes or receives other nodes and sends over
State change notification packet (such as R-APS etc.) after, carry out the protection switching of business, specifically include:
Notification packet is changed, when knowing that Link State is changed into normal condition and become link or joint according to the state received
When point breaks down, the business being sent to trouble point that work tunnel transmits is switched to close accordingly guarantor by fault phase neighbors
Protect on tunnel, the business being sent to trouble point that closed protective tunnel transmits is switched in corresponding work tunnel;Fault phase
Node outside neighbors carries out transparent transmission to the business transmitted;
Notification packet is changed, when knowing that Link State changes into link or node failure disappears according to the state received
Time, then the business being switched on described closed protective tunnel transmit is restored to described work tunnel by fault phase neighbors
On.
Additionally, business handover module is additionally operable to carry out the change of state on this node, for fault phase neighbors, by
Idle state becomes Switch state or is become Idle state by Swtich state;And for nonneighbor node in fault, then by
Idle state becomes pass through state or is become idle state by pass through state.
Specifically, when Link State changes into link or one malfunctions, fault phase neighbors is by the shape of this node
State changes into Switch state, and the state of this node is changed into Pass through state by the node outside fault phase neighbors;
When Link State change into link or node failure disappear time, fault phase neighbors by the state of this node by
Switch state changes into Idle state;The state of this node is changed by the node outside fault phase neighbors by Pass through state
For Idle state.
As a example by fault below in conjunction with network shown in Fig. 3 and Fig. 4, the specific implementation process of looped network protection of the present invention is made
Further describe in detail.
It should be noted that the business of the overlapping trees carrying of the present invention can be the vpn service (L2/L3 of single layer label
VPN), it is also possible to be the LSP service (IP-MPLS/MPLS-TP Tunnel etc.) of multilayer labels, even without label IP or
Eth business.
For looped network business, its main process realizing looped network protection is described as follows:
Step 1, configuration work tunnel and closed protective tunnel;
For D point in the network shown in Fig. 3, if its work tunnel is configured to its counterclockwise (C-B-A-F-
E-D), its corresponding protection tunnel is D-E-F-A-B-C-D closed-loop.Or, it is also possible to work tunnel is configured to up time
Pin direction (E-F-A-B-C-D), the protection tunnel of its correspondence is D-C-B-A-F-E-D.
Step 2, if by business 1(LSP business or IP operation or PW business) and business 2(LSP business, IP operation or PW
Business) enter ring from node on the ring A and B respectively, then on ring under non-failure conditions, business 1 and business 2 are respectively at A and B point
Upper press-in (PUSH) transmits to C-B-A-F-E-D in same work tunnel, and after its encapsulation, the form of message is as shown in table 1 below.
Table 1 message encapsulation format
Wherein, Tunnel Label: represent outer layer forward-path label;
LSP Label: representing and entering on ring, this business is LSP service, then entering on link point, carrying out LSP label friendship
After changing (swap), then it is pressed into outer layer tunnel Tunnel Label, outer layer tunnel transmits;
IP Header: represent that being directly accessed into is IP operation when entering on link point, then directly IP operation is pressed into
Outer layer tunnel Tunnel Label, transmits in outer layer tunnel;
PW Label: represent entering on link point, being accessed is the business (such as: ATM, ETH, TDM etc.) of pseudo wire emulation,
Then originally entering after link point carries out local service process (NSP), after stamping corresponding PW Label, then be pressed into outer layer tunnel
Tunnel Label, transmits in outer layer tunnel;
PDU: refer to the content of the concrete packaged business in the inside.
Exchange (swap) operation of outer layer tunnel label is only carried out in node on the ring, and outside it goes out and ejects on link point D
After layer label 300, directly business 1 and business 2 business to the inside carry out corresponding process;If for LSP service, the most first bullet
Go out (POP) outer layer Tunnel label, then carry out going out ring after the inside LSP Label exchanges (Swap);If for IP operation, bullet
After going out (POP) outer layer Tunnel Label, directly according to information on IP Header packet header, the inside, carry out ring and process;If PW
For business, the most first eject after (POP) outer layer Tunnel Label, then after ejecting (POP) PW Label, enter according to PW Label
The encapsulation of row artificial service etc. process, then go out ring operation.
Step 3, when node on the ring E or F detect link or node failure (malfunctioning node E or F), then by this work tunnel
The business (such as business 1, business 2 etc.) of all transmission on road is switched to protect the upper transmission in tunnel (D-E-F-A-B-C-D);And will
Generation state change notification packet (such as R-APS etc.) is sent on ring other nodes along the direction away from fault of ring.
Step 4, when on ring, other nodes receive state change notification packet, for healthy phases neighbors,
Then it is become pass through state from IDLE state;Then from idle state, Switching is become for fault peer node
State.
So, business 1 and business 2 business enter ring from node A and B, are first pressed into work tunnel C-B-A-F-E-D and pass
Send;When being sent on node F, then it is switched to protect on tunnel, original working tunnel label 100 is exchanged (Swap) to protection
Tunnel label 101, press-in protection tunnel F-A-B-C-D-E, after being sent to node E, protection tunnel label 301 is exchanged into again work
Make tunnel label 300, be again pressed into work tunnel transmission, until it reaches its ring egress D, eject outer operative tunnel label
After 300, directly the business 1 of the inside and business 2 business etc. are processed.
Step 5, when failure vanishes on ring, as shown in Figure 4, between F and E, link failure disappears, when node F or E detects
During to failure vanishes, then F or E becomes Idle from Switching state, and will weigh again on D-E-F-A-B-C-D on protection tunnel
Newly return to C-B-A-F-E-D in work tunnel transmit;Meanwhile, node E or F that the state that detects changes, will additionally generate one
The state of failure vanishes changes notification packet, away from the direction of fault on ring, is sent on ring other nodes.
Step 6, when on ring, other nodes receive the state change notification packet of this failure vanishes, then by original
Switching and Pass Through state changes over Idle state;And also will originally protect tunnel to upload on E or F node
Send and transmit on business switch operating tunnel the most again.
Step 7, and for business 1 and business 2, it is pressed into its work tunnel C-B-A-F-E-D again, it is sent to it
After going out link point D, after ejecting outer operative tunnel label 300, business 1 and business 2 business further according to the inside process.
Fig. 5 shows the handling process of the ring net protection method of the embodiment of the present invention, as it is shown in figure 5, this flow process includes:
Step 101, on ring, for the purpose of the lower link point (also referred to as egress) of business, node configures work tunnel and envelope
Close protection tunnel.
Step 102, every section of link periodically sends fault detect message.
Step 103, it may be judged whether detect that Link State changes, if it is, perform step 104, otherwise, performs step
105。
Step 104, the state that is immediately generated changes notification packet, is sent on ring other nodes.
Step 105, periodically sends state advertisement message.
Step 106, node on the ring detects or receives other states and changes notification packet.
Step 107, it is judged that Link State changes whether become malfunction from normal condition, if it is, perform step
108, otherwise, perform step 109.
Step 108, each node is set to Switching or Pass through state, and performs step 110.
Step 109, each node is set to Idle state.
Step 110, carries out business and transmits the switching in tunnel.
These are only that the present invention's is preferable to carry out case, be not limited to the present invention, the present invention also can have other
Various embodiments, in the case of without departing substantially from present invention spirit and essence thereof, those of ordinary skill in the art can be according to this
Bright make various corresponding change and deformation, but these change accordingly and deformation all should belong to appended claims of the invention
Protection domain.
Obviously, those skilled in the art should be understood that each module of the above-mentioned present invention or each step can be with general
Calculating device realize, they can concentrate on single calculating device, or be distributed in multiple calculating device and formed
Network on, alternatively, they can with calculate the executable program code of device realize, it is thus possible to by they store
Performed by calculating device in the storage device, and in some cases, can perform with the order being different from herein shown
The step gone out or describe, or they are fabricated to respectively each integrated circuit modules, or by the multiple modules in them or
Step is fabricated to single integrated circuit module and realizes.So, the present invention is not restricted to the combination of any specific hardware and software.
Claims (11)
1. a looped network tunnel configuration method based on overlapping trees, it is characterised in that
The overlapping trees of one net loaded multiple multipoint-to-point MP2P of physical rings, described overlapping trees carrying from ring or many
Individual node is to the business of same destination node;
On ring for the purpose of the lower link point of business node configure work tunnel based on overlapping trees, and with described work tunnel
Reverse closed protective tunnel accordingly, road, described configuration work tunnel is: along described ring clockwise and/or counterclockwise from
The adjacent node of described lower link point, to described lower link point, sets up work tunnel;Described configuration closed protective tunnel is: along institute
The rightabout stating work tunnel is set up from described lower link point to the closed protective tunnel of described lower link point.
2. a ring net protection method based on overlapping trees, it is characterised in that the net loaded multiple multipoint-to-points of physical rings
The overlapping trees of MP2P, described overlapping trees carrying from ring one or more nodes to the business of same destination node;Institute
The method of stating includes:
On ring for the purpose of the lower link point of business node configure work tunnel based on overlapping trees, and with described work tunnel
Reverse closed protective tunnel accordingly, road, described configuration work tunnel is: along described ring clockwise and/or counterclockwise from
The adjacent node of described lower link point, to described lower link point, sets up work tunnel;Described configuration closed protective tunnel is: along institute
The rightabout stating work tunnel is set up from described lower link point to the closed protective tunnel of described lower link point;
Link State between each nodal test and adjacent node on ring, when detecting that Link State changes, the state that sends changes
Notification packet is to other nodes on ring;
When described Link State changes into link or one malfunctions, the business being sent to trouble point that work tunnel transmits
When being sent to fault phase neighbors, the working tunnel label of described business is exchanged for protecting tunnel mark by this fault phase neighbors
Signing, press-in transmits on closed protective tunnel;When protecting the business transmitted on tunnel to be sent to another fault phase neighbors, should
The protection tunnel label of described business is exchanged for again working tunnel label by fault phase neighbors, is again pressed in work tunnel
Transmit, until described business arrives its ring egress;Node outside fault phase neighbors carries out transparent transmission to the business transmitted.
3. method as claimed in claim 2, it is characterised in that described method also includes:
When described Link State changes into link or node failure disappears, fault phase neighbors will be switched to described closed protective
The business transmitted on tunnel is restored in described work tunnel.
4. method as claimed in claim 2 or claim 3, it is characterised in that described method also includes:
When described Link State changes into link or one malfunctions, the state of this node is changed into by fault phase neighbors
Switching Switch state, the state of this node is changed into break-through Pass through state by the node outside fault phase neighbors;
When described Link State change into link or node failure disappear time, fault phase neighbors by the state of this node by
Switch state changes into idle Idle state;Node outside fault phase neighbors by the state of this node by Pass through state
Change into Idle state.
5. method as claimed in claim 2 or claim 3, it is characterised in that described method also includes:
Service message uses press-in PUSH looped network tunnel label stacked manner when upper ring forwards, i.e. according to described lower link point
Traffic direction with work tunnel is pressed into the tunnel label of PUSH overlapping trees, forwards along looped network, described lower link point
Eject POP tunnel label and carry out ring under business.
6. method as claimed in claim 4, it is characterised in that
The business of described overlapping trees carrying, including: the VPN (virtual private network) vpn service of single layer label, the label of multilayer labels
Switching path LSP service, without the IP of label or Ethernet Eth business.
7. method as claimed in claim 6, it is characterised in that
Described work tunnel supports that PHP is ejected in the last two jump.
8. a looped network tunnel configuration system based on overlapping trees, it is characterised in that the net loaded multiple multiple spots of physical rings
To some MP2P overlapping trees, described overlapping trees carrying from ring one or more nodes to the industry of same destination node
Business;Including: path configuration module,
Described path configuration module is used for, and on ring, for the purpose of the lower link point of business, node configures work based on overlapping trees
Tunnel, and reversely closed protective tunnel corresponding with described work tunnel, described configuration work tunnel is: suitable along described ring
Hour hands and/or counter clockwise direction to described lower link point, set up work tunnel from the adjacent node of described lower link point;Described join
Putting closed protective tunnel is: the rightabout along described work tunnel is set up from described lower link point to the envelope of described lower link point
Close protection tunnel.
9. a Ring protection system based on overlapping trees, it is characterised in that the net loaded multiple multipoint-to-points of physical rings
The overlapping trees of MP2P, described overlapping trees carrying from ring one or more nodes to the business of same destination node;Institute
The system of stating includes:
Path configuration module, on ring for the purpose of the lower link point of business node configure work tunnel based on overlapping trees
Road, and reversely closed protective tunnel corresponding with described work tunnel, described configuration work tunnel is: along the up time of described ring
Pin and/or counter clockwise direction to described lower link point, set up work tunnel from the adjacent node of described lower link point;Described configuration
Closed protective tunnel is: the rightabout along described work tunnel is set up from described lower link point to the closing of described lower link point
Protection tunnel;
State detection module, for detecting the Link State between this node and adjacent node;
State advertisement module, the Link State between detection and adjacent node, when detecting that Link State changes, send shape
State changes notification packet to other nodes on ring;
Business handover module, for changing notification packet according to the described state received, when knowing that described Link State changes
When becoming link or one malfunctions for normal condition, the business being sent to trouble point that work tunnel transmits is sent to fault
During adjacent node, the working tunnel label of described business is exchanged for protecting tunnel label, press-in to close by this fault phase neighbors
Protection transmits on tunnel;When protecting the business transmitted on tunnel to be sent to another fault phase neighbors, this fault adjacent segments
The protection tunnel label of described business is exchanged for again working tunnel label by point, is again pressed in work tunnel transmission, until
Described business arrives its ring egress;Node outside fault phase neighbors carries out transparent transmission to the business transmitted.
10. system as claimed in claim 9, it is characterised in that
Described business handover module is additionally operable to, and changes notification packet according to the described state received, when knowing described link shape
When state changes into link or node failure disappearance, then fault phase neighbors will be switched on described closed protective tunnel the industry transmitted
Business is restored in described work tunnel.
11. systems as claimed in claim 10, it is characterised in that
Described business handover module is additionally operable to, and when described Link State changes into link or one malfunctions, fault is adjacent
The state of this node is changed into Switch state by node, and the state of this node is changed into by the node outside fault phase neighbors
Pass through state;
When described Link State change into link or node failure disappear time, fault phase neighbors by the state of this node by
Switch state changes into Idle state;The state of this node is changed by the node outside fault phase neighbors by Pass through state
For Idle state.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110198332.1A CN102882780B (en) | 2011-07-15 | 2011-07-15 | Looped network tunnel configuration method based on overlapping trees, ring network protection method and system |
PCT/CN2012/077223 WO2013010422A1 (en) | 2011-07-15 | 2012-06-20 | Share-path-based ring network tunnel configuration method, ring network protection method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110198332.1A CN102882780B (en) | 2011-07-15 | 2011-07-15 | Looped network tunnel configuration method based on overlapping trees, ring network protection method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102882780A CN102882780A (en) | 2013-01-16 |
CN102882780B true CN102882780B (en) | 2016-09-28 |
Family
ID=47483931
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110198332.1A Active CN102882780B (en) | 2011-07-15 | 2011-07-15 | Looped network tunnel configuration method based on overlapping trees, ring network protection method and system |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN102882780B (en) |
WO (1) | WO2013010422A1 (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103973536A (en) * | 2013-02-05 | 2014-08-06 | 中国移动通信集团公司 | Device and method for protection of point-to-multipoint looped network |
CN104660501A (en) * | 2013-11-25 | 2015-05-27 | 中兴通讯股份有限公司 | Shared protection method, device and system |
CN105099748A (en) * | 2014-05-23 | 2015-11-25 | 中兴通讯股份有限公司 | Method and system for migrating business tunnel |
CN105207871B (en) * | 2014-06-25 | 2020-07-31 | 南京中兴软件有限责任公司 | Double-cut ring network protection method and device |
US10218611B2 (en) | 2014-06-30 | 2019-02-26 | Juniper Networks, Inc. | Label distribution protocol (LDP) signaled multi-protocol label switching rings |
US9692693B2 (en) * | 2014-06-30 | 2017-06-27 | Juniper Networks, Inc. | Bandwidth control for ring-based multi-protocol label switched paths |
US9729455B2 (en) * | 2014-06-30 | 2017-08-08 | Juniper Networks, Inc. | Multi-protocol label switching rings |
CN105591898A (en) * | 2014-10-21 | 2016-05-18 | 中兴通讯股份有限公司 | Tunnel protection method and tunnel protection device based on shared tunnels |
US11233748B1 (en) | 2018-08-30 | 2022-01-25 | Juniper Networks, Inc. | Bandwidth management for resource reservation label switched path of a ring network |
CN109462500B (en) * | 2018-10-26 | 2020-09-18 | 江西山水光电科技股份有限公司 | Packet transport network PTN equipment looped network protection method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101316212A (en) * | 2008-07-07 | 2008-12-03 | 华为技术有限公司 | Looped network failure processing method, looped network and operator backbone equipment |
CN101431459A (en) * | 2008-12-17 | 2009-05-13 | 烽火通信科技股份有限公司 | Looped network protection method for transmitting multiprotocol label switching network |
US7545735B1 (en) * | 2003-03-11 | 2009-06-09 | Atrica Israel Ltd. | Scalable protection mechanism for hierarchical multicast service in ring based networks |
CN101877665A (en) * | 2009-04-29 | 2010-11-03 | 华为技术有限公司 | Ring network protecting method, network node and ring network |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6622258B1 (en) * | 2000-04-10 | 2003-09-16 | Appian Communications, Inc. | Data protection in a ring network |
US8204374B2 (en) * | 2004-12-10 | 2012-06-19 | Ciena Corporation | Reconfigurable multichannel (WDM) optical ring network with optical shared protection |
CN102014011A (en) * | 2009-09-04 | 2011-04-13 | 中兴通讯股份有限公司 | Method and system for protecting looped network |
CN102035712B (en) * | 2009-09-29 | 2013-12-18 | 华为技术有限公司 | Multiprotocol label exchanged ring network protection method, device and system |
-
2011
- 2011-07-15 CN CN201110198332.1A patent/CN102882780B/en active Active
-
2012
- 2012-06-20 WO PCT/CN2012/077223 patent/WO2013010422A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7545735B1 (en) * | 2003-03-11 | 2009-06-09 | Atrica Israel Ltd. | Scalable protection mechanism for hierarchical multicast service in ring based networks |
CN101316212A (en) * | 2008-07-07 | 2008-12-03 | 华为技术有限公司 | Looped network failure processing method, looped network and operator backbone equipment |
CN101431459A (en) * | 2008-12-17 | 2009-05-13 | 烽火通信科技股份有限公司 | Looped network protection method for transmitting multiprotocol label switching network |
CN101877665A (en) * | 2009-04-29 | 2010-11-03 | 华为技术有限公司 | Ring network protecting method, network node and ring network |
Also Published As
Publication number | Publication date |
---|---|
WO2013010422A1 (en) | 2013-01-24 |
CN102882780A (en) | 2013-01-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102882780B (en) | Looped network tunnel configuration method based on overlapping trees, ring network protection method and system | |
CN103312613B (en) | Service message retransmission method and device | |
CN102025646B (en) | Link switching method and device thereof | |
CN106487675A (en) | For the outlet protection in EVPN with BUM flow during link failure | |
CN100359860C (en) | Multiprotocol label switching network protection switching method | |
CN101710877A (en) | Method, device and system for processing traffic flow based on pseudowire | |
CN102891787B (en) | Looped network tunnel configuration method, business switch method and system based on overlapping trees | |
CN102035714B (en) | A kind of crossing tangent ring networks guard method and system | |
CN101931586B (en) | Method and system for rapidly rerouting MPLS VPN (Multi-Protocol Label Switching Virtual Private Network) | |
WO2011021179A1 (en) | Technique for dual homing interconnection between communication networks | |
CN101783743B (en) | Business protection method and switching node | |
CN102820990A (en) | Method and device for switching service protection | |
Hariyawan | Comparison analysis of recovery mechanism at MPLS network | |
CN102857316B (en) | A kind of method and system realizing source looped network protection | |
CN108243114A (en) | A kind of method to E-Packet, equipment and system | |
WO2013049981A1 (en) | Hybrid ring network protection method and system based on shared path | |
CN104468208A (en) | Detection and recovery method and device for communication faults | |
WO2015154603A1 (en) | Tunnel protecting method and device based on shared tunnel | |
WO2008132203A2 (en) | Recovering from a failure in a communications network | |
CN104702431B (en) | A kind of method and device of Virtual Private Network double break protection | |
CN102611610A (en) | Method and system for centralized management of a plurality of tunnels with same path | |
CN102185773B (en) | Multi-protocol label switching transport profile ring protection switching method and node | |
CN108023800A (en) | A kind of guard method of LTE bearer networks and device | |
WO2016090815A1 (en) | Switching control method and device in deploying high-capacity service | |
CN102916842A (en) | Method for implementing PTN (Packet Transport Network) equipment double-returning protection by overlaying various protection modes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20201223 Address after: 224006 room 1306, yanchuang building, Yandu District, Yancheng City, Jiangsu Province (d) Patentee after: Yancheng Hengmao Landscaping Co.,Ltd. Address before: 518057 Ministry of justice, Zhongxing building, South Science and technology road, Nanshan District hi tech Industrial Park, Shenzhen, Guangdong Patentee before: ZTE Corp. |